Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

environment

Results 326 - 350 of 2811Sort Results By: Published Date | Title | Company Name
Published By: Puppet     Published Date: Mar 09, 2017
System administrators and other IT practitioners spend as much as 50% of their time on routine, repetitive tasks. Does the following apply to your organization? • You go from one server to the next, installing the same package on all of them. It works nine times out of 10, but the tenth time causes a failure ... and you can't identify what went wrong. • You can't scale. When the business wants to move to the cloud, or asks for faster provisioning of development and test environments, you only have so many hours in the day — and you can't meet everyone's needs. • You don't have time to get to the work that matters. You spend too much time on routine system management, and can't prepare for the projects that will bring real business value to your team — and customers. With growing demands from all corners of your organization, you simply can't keep doing it all manually. Download this paper to learn how you can benefit from automation, and how IT infrastructure can become a strategic ass
Tags : 
    
Puppet
Published By: Puppet     Published Date: Mar 09, 2017
DevOps cuts deep and wide through industries, company sizes, and technology environments. Yet, DevOps is never done — it’s about continual learning and improvement rather than an end state. Puppet is here to help. We draw on the success stories and lessons learned at organizations that are already driving improved performance and better business outcomes with their DevOps initiatives. This handbook captures five essential phases for mapping out a DevOps journey: 1. Build the business case for DevOps. 2. Address the biggest challenges to DevOps success. 3. Develop a performance-driven team structure. 4. Choose the right Tools and processes. 5. Plan your key implementation phases.
Tags : 
    
Puppet
Published By: Puppet     Published Date: Mar 09, 2017
Configuration management can play an incredibly important role in IT security due to its basis in establishing and maintaining a known and consistent state of the physical and software elements at your organization’s disposal. This white paper explores how to leverage configuration management to bolster security and meet compliance regulations. Uncover some of the key benefits, including: • Creation of a Standard Operating Environment (SOE) • Reporting on and control of configuration drift • Enhanced change remediation • Insight into configuration knowledge • And more
Tags : 
    
Puppet
Published By: Puppet     Published Date: Mar 09, 2017
If you work in IT, you can’t escape the buzz about containers. Containers are a lightweight way of building and deploying applications as a set of composable microservices that abstract away the underlying infrastructure. As containers and microservices become more mainstream, you need to understand the path to adoption, and which tools come into play. Download this guide to get an introduction to containers, explore their value, and see how configuration management applies to containers. We also discuss how to: • Adopt and scale containers faster. • Move existing services to containers. • Eliminate the friction between development, QA, and production environments.
Tags : 
    
Puppet
Published By: Panaya     Published Date: Aug 04, 2016
This Panaya whitepaper explores methodologies and best practices for achieving IT agility for critical enterprise applications (ERP) in the era of digital transformation. It provides a unique perspective about how to increase IT velocity while minimizing IT risk and ensuring quality in a traditional IT environment.
Tags : 
panaya, erp, enterprise resources, digital transformation, digitalization, enterprise planning, erp software, enterprise applications
    
Panaya
Published By: Panasonic Business Mobility Solutions     Published Date: Feb 17, 2017
In today's competitive retail environment, customers want to interact with your business through different channels. On the front end online, mobile and in-store experiences are all important, and all have to tell the same story about what’s new, in-stock and what’s on sale if you want to build satisfaction and loyalty to your brand.
Tags : 
    
Panasonic Business Mobility Solutions
Published By: Evariant     Published Date: Sep 07, 2016
The physician liaison position is a relatively new one for most health systems, but individuals hired as physician liaisons are being held accountable for facilitating impactful, fast change. Where marketing drives incremental revenues by targeting patients and consumers (non-patients), physician liaisons drive incremental revenues by cultivating relationships with physicians and improving referral behavior.
Tags : 
evariant, physician liaison, hospital, physician alignment
    
Evariant
Published By: Evariant     Published Date: Apr 03, 2017
Health systems must capitalize on every patient and consumer interaction—from fielding the first inquiry to actively supporting proactive health, ongoing care, and recovery—to achieve a “trusted provider” status in the eyes of consumers and patients. Yet, the majority of call centers today do not deliver the robust, personalized support capabilities today’s patients and consumers expect, and the current healthcare marketing environment demands. Download your free copy of this eBook to learn why sophisticated health systems are transforming yesterday’s call center into tomorrow’s engagement center.
Tags : 
patient engagement, call center, improved care continum
    
Evariant
Published By: HPE APAC     Published Date: Feb 24, 2017
What is converged storage? Read on to find out more.
Tags : 
converged storage, data, enterprise data protection, threat and vulnerability management, data protection
    
HPE APAC
Published By: RedHat     Published Date: May 10, 2017
By establishing an environment based on an enterprise-ready, open-source operating system — Red Hat® Enterprise Linux® — and a hardware platform based on Intel® architecture, organisations can immediately obtain benefits by migrating select workloads to a standardized environment. More ambitious modernization efforts can yield additional benefits, but the heart of every project should be a solid, proven foundation.
Tags : 
red hat, linux, enterprise linux, open source, open source platform
    
RedHat
Published By: CA Technologies     Published Date: Sep 25, 2017
These challenges stem from an increased focus on agility and scale for building modern applications—and traditional application development methodology cannot support this environment. CA Technologies has expanded full lifecycle API management to include microservices—an integration enabling the best of breeds to work together to provide the platform for modern architectures and a secure environment for agility and scale. CA enables enterprises to use best practices and industry–leading technology to accelerate and make the process of architecture modernization more practical.
Tags : 
api, microservices, digital transformation, performance management, enterprise, developers, ca technologies
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: Tenable     Published Date: Aug 07, 2018
When it comes to IT infrastructure, it’s fair to say the perimeter has left the premises. Whether it’s discovering short-lived assets (e.g., containers), assessing cloud environments or maintaining web application security, today’s attack surface presents a growing challenge to CISOs looking to understand and reduce their cyber risk. To combat this issue, a discipline called Cyber Exposure is emerging to help organizations manage and measure this risk. This ebook provides insights on how CISOs are addressing the modern attack surface.
Tags : 
cyber exposure, iot, vulnerability management, cloud security, mobile security, container security
    
Tenable
Published By: Tenable     Published Date: Nov 06, 2018
How are your peers securing the expanding attack surface within and beyond the traditional perimeter? Digital transformation is putting pressure on every organizational function – especially IT security. Whether it’s discovering short-lived assets like containers, assessing the state of cloud environments, or maintaining the security of web applications, accurately understanding and reducing cyber risk across your entire attack surface is a growing challenge. To give you perspective and insights into how other InfoSec leaders are addressing this challenge, join us at 2pm ET, March 15, 2018 for “Panel Webinar: Reducing Cyber Exposure from Cloud to Containers.” Tenable has assembled a panel of experts who will share their experiences and respond to your questions. Topics covered will include: Making the attack surface as small as possible Understanding asset priority and location Expanding visibility and control over assets beyond the perimeter Enhancing basic security practices to ac
Tags : 
    
Tenable
Published By: IBM APAC     Published Date: Nov 13, 2018
Expert single-source support across your entire multivendor IT environment, help reduce complexity, decrease costs and ensure availability
Tags : 
    
IBM APAC
Published By: Dell EMEA     Published Date: Mar 05, 2019
In a business environment increasingly threatened by aggressive malware, ransomware and data theft, Dell client devices and the Dell endpoint security portfolio deliver a unique combined hardware and software solution, integrating revolutionary threat prevention with enterprise-class encryption and authentication, all managed from a single console. Learn more about Dell solutions powered by Intel®.
Tags : 
    
Dell EMEA
Published By: IBM APAC     Published Date: Aug 25, 2017
Digital technologies have altered how people and businesses interact. Digital forces have created unprecedented levels of industry dislocation and are fundamentally changing business economics. To succeed in this disruptive environment,organizations will need to offer compelling new experiences, establish new focus, build new expertise and devise new ways of working. Business leaders will face a stark choice: Either digitally reinvent their enterprises, or watch as their businesses decompose around them. Successful Digital Reinvention will involve a fundamental reimagining of how an organization operates and how it engages with its environment.
Tags : 
technology factors, market factors, macroeconomic, technological disruption, regulatory concerns, socioeconomic factors
    
IBM APAC
Published By: Sage People     Published Date: Dec 04, 2017
What is People Science? With People Science, organisations can finally use people data to understand how and why the workforce behaves the way it does. Once they have an insight into how their people interact with their environment and how that affects systems and performance, they can go about making better people decisions.
Tags : 
analytics, workforce, data, sources, record, organisation
    
Sage People
Published By: Proofpoint     Published Date: Apr 28, 2017
Read on to find out how an advanced email security solution can provide better security and compliance defences in today’s stormy cybersecurity environment.
Tags : 
cyber security, cybersecurity, security, compliance, threat detection, treat and vulnerability management
    
Proofpoint
Published By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Savvis UK Limited     Published Date: May 14, 2013
Savvis has been hosting eCommerce platforms for nearly two decades. Internet retailers including easyJet and Hallmark Digital trust us to power their online success. Savvis offers a comprehensive portfolio of infrastructure, network and application management across the eCommerce ecosystem. No matter what you sell or where you are along the eCommerce journey, we can support your commercial goals with the speed of implementation, accessibility, security and affordability of a retail-ready cloud environment, with our Virtual Private Data Centre. Combined with our global data centre footprint and network options ranging from Tier1 public IP access to private, low-latency connectivity, the VPDC offers a resilient, made-to-measure solution for any eCommerce application.
Tags : 
virtual, private, data centre, it foundation, ecommerce, platforms, internet retailers, online, virtual private data centre, security, affordability
    
Savvis UK Limited
Published By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG Lab report presents the results of a mixed workload performance benchmark test designed to assess the real world performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers in a VMware-enabled virtual server environment.
Tags : 
esg, virtualization, ibm, storwize v7000, storage, management, consolidation, virtualization, tiering, migration, backup, replication, non-disruptive, ssd, solid state, metro mirror, global mirror, raid, if award winner storwize v7000, ibm smarter planet
    
Ogilvy - IBM UK
Published By: Oracle     Published Date: Sep 01, 2016
This report examines the marketing challenges and opportunities that can be addressed with analytics, and highlight the advantages of achieving comprehensive analytics in a cloud environment.
Tags : 
marketing analytics, cloud computing, analytics, cloud
    
Oracle
Published By: IBM APAC     Published Date: Aug 22, 2017
While working to maintain tactical control of the mobile environment, IT managers often find themselves drowning in minutiae. Overwhelmed by the number of moving parts, they’re unable to stay abreast of the latest threats, let alone extract meaning from or make decisions based on the mountains of data now being collected. With limited IT resources dedicated to mobile technology tools that facilitate reactive rather than proactive management—and limited visibility into mobile intelligence across the organization—many managers have had to choose between security and productivity as the focus of their efforts.
Tags : 
security risks, it operations, workforce, advisor, mobile security, mobile metrics, cloud based, benchmarking data, ibm
    
IBM APAC
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.